A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system.
This vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize “../” sequences that can resolve to a location that is outside of that directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Prime_infrastructure | Cisco | 2.0.0 (including) | 2.0.0 (including) |
Prime_infrastructure | Cisco | 2.1 (including) | 2.1 (including) |
Prime_infrastructure | Cisco | 2.2 (including) | 2.2 (including) |
Prime_infrastructure | Cisco | 3.0.0 (including) | 3.0.0 (including) |
Prime_infrastructure | Cisco | 3.1.0 (including) | 3.1.0 (including) |
Prime_infrastructure | Cisco | 3.1.5 (including) | 3.1.5 (including) |
Prime_infrastructure | Cisco | 3.2 (including) | 3.2 (including) |
Prime_infrastructure | Cisco | 3.2.0-fips (including) | 3.2.0-fips (including) |
Prime_infrastructure | Cisco | 3.3.0 (including) | 3.3.0 (including) |
Prime_infrastructure | Cisco | 3.4.0 (including) | 3.4.0 (including) |
Prime_infrastructure | Cisco | 3.5.0 (including) | 3.5.0 (including) |
Prime_infrastructure | Cisco | 3.6.0 (including) | 3.6.0 (including) |
Prime_infrastructure | Cisco | 3.7.0 (including) | 3.7.0 (including) |
Prime_infrastructure | Cisco | 3.8.0 (including) | 3.8.0 (including) |
Prime_infrastructure | Cisco | 3.9.0 (including) | 3.9.0 (including) |
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. The “../” manipulation is the canonical manipulation for operating systems that use “/” as directory separators, such as UNIX- and Linux-based systems. In some cases, it is useful for bypassing protection schemes in environments for which “/” is supported but not the primary separator, such as Windows, which uses “" but can also accept “/”.